Hackers and the Internet of Things

Are Criminals using IOT devices to infiltrate networks?

“Everything you connect to the internet is vulnerable.”

Professor Marco Gercke, the founder of the CyberCrime Research Institute, talks to Jeremy Swinfen Green about IoT hacks and why security cameras are less vulnerable than IT systems.

Marco Gercke will be speaking at the inaugural teissBenelux2020 cyber security summit, taking place online from 27 to 29 October 2020. For free registration and more information, click here.

Video transcript:

Are you finding people using devices that are connected to the internet– the internet of things, like baby monitors and security cameras– are criminals using that as a way into people’s homes– home networks?

Well, it’s definitely a point. Anything you are connecting to the internet is potentially vulnerable. And there are companies that are investing more and there are companies that are investing less in cyber security. So it is a potential possibility to enter a network.

However, we are seeing this with regard to various devices. So it can be a printer– usually, it is the computer system, as this is the most vulnerable part. It doesn’t have a single use, but you’re installing all kinds of software. You’re attaching all kinds of hardware to it.

So it makes it much more difficult to secure properly than a device that, for example, only has a video recording function.

Copyright Lyonsdown Limited 2021

Top Articles

Is your security in need of an update this Cybersecurity Awareness month?

Cyber security experts tell teiss about the evolving threat landscape and how organisations can bolster their cyber security defenses

A new case for end-to-end encryption

How a hacker group got hold of calling records and text messages deploying highly sophisticated tools that show signs of originating in China

Telcos in Europe put muscle behind firewalls as SMS grows

Messaging is set to be one of the biggest traffic sources for telcos worldwide prompting them to protect loss of revenue to Grey Route practices 

Related Articles

[s2Member-Login login_redirect=”https://www.teiss.co.uk” /]